Abstract
In an unreliable environment such as global computing, resource providers are faced with the problem of making decision autonomously with partial information before providing services for resource requesters. Although many trust management models have been proposed to deal with security concerned in resource service, few of them take risk into consideration. In those schemes involving risk, either risk is discussed conceptually, or methods for calculating risk and trustworthiness are not described clearly. This paper presents a risk-aware resource service decision strategy for global computing. The paper not only explores the pivotal source of risk and the relationship between trust and risk, but also quantifies risk to facilitate the resource service decision. The paper proposes the reputation inference based on probability theory and risk degree algorithm based on Chernoff Bound theorem. In the simulation, the performance of our risk-aware resource service decision strategy is evaluated.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Global Computing Initiative, http://cordis.europa.eu/ist/fet/gc.htm
Ruohomaa, S., Kutvonen, L.: Trust Management Survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005)
English, C., Terzis, S., Wagealla, W.: Engineering Trust Based Collaborations in a Global Computing Environment. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 120–134. Springer, Heidelberg (2004)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: IEEE Symposium on Security and Privacy, pp. 164–173. IEEE Press, New York (1996)
Povey, D.: Developing Electronic Trust Policies Using a Risk Management Model. In: Baumgart, R. (ed.) CQRE 1999. LNCS, vol. 1740, pp. 1–16. Springer, Heidelberg (1999)
McKnight, D.H., Chervany, N.L.: The Meanings of Trust. Technical Report, MISRC Working Paper Series 96-04, University of Minnesota, Management Information Systems Research Center (1996)
Dimitrakos, T.: A Service-oriented Trust Management Framework. In: Falcone, R., Barber, S.K., Korba, L., Singh, M.P. (eds.) AAMAS 2002. LNCS (LNAI), vol. 2631, pp. 53–72. Springer, Heidelberg (2003)
Grandison, T., Sloman, M.: A Survey of Trust in Internet Application. IEEE Communication Survey 3, 2–16 (2000)
Grandison, T., Sloman, M.: Specifying and Analyzing Trust for Internet Application. In: 2nd IFIP Conference on Towards the Knowledge Society: E-Commerce, E-Business, E-Government, pp. 145–157. Kluwer, Deventer (2002)
Jøsang, A., Presti, L.S.: Analysing the Relationship Between Risk and Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 135–145. Springer, Heidelberg (2004)
Manchala, D.W.: Trust Metrics, Models and Protocols for Electronic Commerce Transactions. In: 18th International Conference on Distributed Computing Systems, pp. 312–321. IEEE Press, New York (1998)
Solhaug, B., Elgesem, D., Stølen, K.: Why Trust is Not Proportional to Risk. In: 2nd International Conference on Availability, Reliability and Security, pp. 11–18. IEEE Press, New York (2007)
Dimmock, N., Bacon, J., Ingram, D., Moody, K.: Risk Models for Trust-based Access Control (TBAC). In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 1–8. Springer, Heidelberg (2005)
Hirshleifer, J., Riley, J.: The Analytics of Uncertainty and Information, Cambridge surveys of economic literature. Cambridge University Press, Cambridge (1992)
Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: 35th Hawail International Conference on System and Sciences, pp. 188–196. IEEE Press, New York (2005)
Asnar, Y., Giorgini, P., Massacci, F., Zannone, N.: From Trust to Dependability through Risk Analysis. In: 2nd International Conference on Availability, Reliability and Security, pp. 19–26. IEEE Press, New York (2007)
Jøsang, A., AlFayyadh, B., Grandison, T., AlZomai, M., McNamara, J.: Security Usability Principles for Vulnerability Analysis and Risk Assessment. In: 23rd Annual Computer Security Application Conference, pp. 269–278. IEEE Press, New York (2007)
Kim, D.J., Ferrin, D.L., Rao, H.R.: A Trust-based Consumer Decision Making Model in Electronic Commerce: The Role of Trust, Perceived risk, and Their Antecedents. Decision Support Systems 44, 544–564 (2008)
Ryutov, T.: A Socio-cognitive Approach to Modeling Policies in Open Environments. In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 29–38. IEEE Press, New York (2007)
Liang, Z.Q., Shi, W.S.: Analysis of Rating on Trust Inference in Open Environments. Performance Evaluation 65, 99–128 (2008)
Liang, Z.Q., Shi, W.S.: PET: A Personalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing. In: 38th Hawail International Conference on System and Sciences, pp. 201.2. IEEE Press, New York (2005)
Dudewicz, E.J., Mishra, S.: Modern Mathematical Statistics. John Wiley & Sons, New York (1988)
Heckerman, D.: A Tutorial on Learning with Bayesian Networks, Learning in Graphical Models. MIT Press, Cambridge (1999)
Mui, L., Mohtashemi, M., Ang, C., Szolovits, P., Halberstadt, A.: Bayesian Rating in Distributed Systems: theories, models and simulations. MIT LCS Memorandum (2001)
Ross, S.: Stochastic Process. John Wiley & Sons, New York (1995)
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using Trust and Risk in Role-based Access Control Policies. In: 9th ACM Symposium on Access Control Models and Technologies, pp. 156–162. ACM, New York (2004)
JAVASIM, http://javasim.codehaus.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Du, W., Cui, G., Liu, W. (2010). A Risk-Aware Resource Service Decision Strategy for Global Computing. In: Xie, B., Branke, J., Sadjadi, S.M., Zhang, D., Zhou, X. (eds) Autonomic and Trusted Computing. ATC 2010. Lecture Notes in Computer Science, vol 6407. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16576-4_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-16576-4_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16575-7
Online ISBN: 978-3-642-16576-4
eBook Packages: Computer ScienceComputer Science (R0)